计算机科学 ›› 2013, Vol. 40 ›› Issue (7): 84-88.

• 信息安全 • 上一篇    下一篇

数据融合中支持隐私保护的完整性动态验证算法

陈伟,杨龙,于乐   

  1. 南京邮电大学计算机学院 南京210023 江苏省无线传感网高技术研究重点实验室 南京210003;南京邮电大学计算机学院 南京210023 江苏省无线传感网高技术研究重点实验室 南京210003;南京邮电大学计算机学院 南京210023 江苏省无线传感网高技术研究重点实验室 南京210003
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(61202353,4)资助

Privacy-preserving Dynamic Integrity-verification Algorithm in Data Aggregation

CHEN Wei,YANG Long and YU Le   

  • Online:2018-11-16 Published:2018-11-16

摘要: 隐私暴露、信息篡改、虚假数据注入都是无线传感器网络数据融合中面临的严峻挑战,在保护数据隐私性的同时进行完整性验证是数据融合技术研究的热点之一。提出了一种新的支持隐私保护的动态完整性验证算法PDI(Privacy-preserving Dynamic Integrity-verification algorithm),它可以在实现数据隐私保护的基础上侦测到信息被非法篡改。PDI算法使用数据扰动进行数据隐私保护,同时根据现有网络结构动态生成监测节点进行数据的完整性验证,融合过程中篡改过的虚假数据能够更快地被检测并丢弃。仿真实验结果显示,PDI算法可使用较少的通信量和计算量实现隐私保护和完整性验证。

关键词: 无线传感器网络,数据融合,隐私保护,完整性验证,数据扰动 中图法分类号TP393-08文献标识码A

Abstract: Privacy exposure,information tampering and false data injection are serious challenges in wireless sensor network data aggregation.How to protect the privacy and integrity of data has become a hot research issue in data aggregation.To detect any malicious data tampering and protect data privacy in data aggregation,a novel Privacy-preserving dynamic Integrity-verification(PDI) algorithm was proposed.The PDI algorithm uses the data is perturbation to protect data privacy.In order to protect the integrity of privacy data,the PDI algorithm generates monitoring nodes between the current aggregator and its parent node depending on the network structure dynamically.Therefore,if the data is tampered by the aggregator,it can be detected at the early stage.The simulation results show that the PDI algorithm can reali-ze privacy preserving and integrity verification with less communication and computation overhead.

Key words: Wireless sensor network,Data aggregation,Privacy preserving,Integrity verification,Data perturbation

[1] Madden S,Franklin M J,Hellerstein J M.TAG:A tiny aggregation service for ad hoc sensor networks[C]∥Proceedings of the 5th Symposium on Operating Systems Design and Implementation.New York,USA,2002:131-146
[2] He Wenbo,Hoang Nguyen,Liu Xue,et al.Pda:Privacy-preserving data aggregation in wireless sensor networks[C]∥Procee-dings of 26th IEEE International Conference on Computer Communications(INFOCOMM).2007:2045-2053
[3] He Wenbo,Hoang Nguyen,Liu Xue,et al.iPDA:An Integrity-Protecting Private Data Aggregation Scheme for Wireless Sensor Networks[C]∥Proceedings of IEEE Military Communications Conference.2008:1-7
[4] Feng T,Wang C,Zhang W,et al.Confidentiality protection for distributed sensor data aggregation[C]∥Proceedings of 27th IEEE International Conference on Computer Communications(INFOCOMM).Phoenix,AZ,USA,2008:56-60
[5] Wang Chuang,Wang Gui-ling,Zhang Wen-sheng,et al.Reconciling Privacy Preservation and Intrusion Detection in Sensory Data Aggregation[C]∥Proceedings of 27th IEEE International Conference on Computer Communications(INFOCOMM).2011:336-340
[6] Przydatek B,Perrig A,Song D.SIA:secure information aggregation in sensor networks[C]∥Proceedings of the 1st international conference on Embedded networked sensor systems.New York,USA,2003:255-265
[7] Yang Y,Wang X,Zhu S,et al.SDAP:a secure hop-by-hop data aggregation protocol for sensor networks[J].ACM Transactions on Information and System Security,2008,11(4)
[8] Ozdemir S,am H.Integration of False Data Detection WithData Aggregation and Confidential Transmission in Wireless Sensor Networks[J].IEEE/ACM T ransactions on Networking,2010,18(3):736-749
[9] Blundo C,Santis A,Herzberg A,et al.Perfectly-secure key distribution for dynamic conferences[J].Proceedings of Crypto,1992,740:471-486
[10] Du W,Deng J,Han Y S,et al.A pairwise key pre-distribution scheme for wireless sensor networks[J].ACM Transactions on Information and System Security,2005,8(2):228-258
[11] Liu D,Ning P,Li R.Establishing pairwise keys in distributed sensor networks[J].ACM Transactions on Information and System Security,2005,8(1):41-77
[12] Karlof C,Sastry N,Wagner D.TinySec:A link layer security architecture for wireless sensor networks[C]∥Proceedings of the 2nd international conference on Embedded networked sensor systems.New York,USA,2004:162-175
[13] Zhang W,Wang C,Feng T.Gp2s:Generic privacy-preservation solutions for approximate aggregation of sensor data[C]∥Proceedings of IEEE PerCom.2008:179-184
[14] 陈娟,张宏莉.无线传感器网络安全研究综述[J].哈尔滨工业大学学报,2011,43(7):90-95
[15] 范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1131-1146
[16] 姚剑波,文光俊.无线传感器网络中的隐私保护研究[J].计算机科学,2008,35(11):19-22
[17] 杨庚,王安琪,陈正宇,等.一种低耗能的数据融合隐私保护算法[J].计算机学报,2011,34(5):792-800
[18] 张鹏,喻建平,刘宏伟.传感器网络安全数据融合[J].计算机科学,2011,38(8):106-108

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!